Indicators of Attack Installation Script

Configure EDR Exclusions for IoA Deployment

To ensure a successful Indicators of Attack (IoA) deployment, you must coordinate with your endpoint security software. Because the deployment uses a PowerShell script triggered by a scheduled task, some Endpoint Detection and Response (EDR) tools may flag the activity as suspicious.

To authorize the script:

  1. Generate the script signature: identify the unique file hash for your specific version of the deployment script.

    1. Open PowerShell.

    2. Run the following command using the Register-TenableIOA.ps1 script:

      Copy
      .\Register-TenableIOA.ps1 -GetSignatureToWhitelist
    3. Copy the SHA256 file hash displayed in the output:

  1. Authorize the Hash in Your EDR:

    1. Log in to your EDR configuration interface.

    2. Navigate to the Exclusions or Allowlist section.

    3. Add the SHA256 hash you copied in Step 1.

    4. Save the changes and allow a few moments for the policy to propagate to your endpoints.

  1. Complete the deployment: run the IoA installation script.

Run the IoA installation Script

To run the IoA script:

  1. Open PowerShell as Administrator, navigate to the script directory, adjust execution policy, and run the script:

    Copy
    .\Register-TenableIOA.ps1
  2. Enter the parameters relevant to your configuration:

    Parameter Description
    GPODisplayName The display name of the GPO used to create the task that registers the event listener. Default: Tenable.ad.
    TemporaryFolderLocation The temporary folder used to store the GPO backup during deployment. Default: %TEMP%\Tenable.ad\.
    DomainControllerAddress The FQDN or IP address of the domain controller to deploy to. Specify this if the script is run from a server or workstation that is not a domain controller. If omitted, domain information is retrieved from the local machine.
    DomainControllerOU The distinguished name of the Organizational Unit containing your domain controllers. Specify this if your DCs have been moved out of the default OU. Example: OU=Domain Controllers,DC=ROOT,DC=DOMAIN.
    TenableServiceAccount The name of the service account used by Tenable Identity Exposure, which requires explicit permission to read Group Policy Objects.
    Uninstall Uninstalls the event listener and WMI Active Script Consumer to stop event log collection. Default: false.
    ConfigurationFileLocation The path to the file that will be used to update the GPO configuration.
    Target

    A comma-separated list of domain controllers targeted by this registration script. Example: DC-ROOT1,DC-ROOT2. This parameter is optional.

    Tip: If used, ensure the list includes the PDCE; otherwise, the IoA deployment will fail.

    CleaningGPODisplayName The display name of the GPO used to create the cleanup task that removes the event listener and WMI Active Script Consumer. Default: Tenable.ad cleaning.
    EventLogsFileWriteFrequency The frequency (in seconds) at which the event log file is generated in DFSR mode for non-PDCE domain controllers. Default: 15 seconds. Maximum: 300 seconds (5 minutes). Optional parameter.
    SmbShareLocation The disk path (absolute) of the SMB share location when running on the PDCE in ‘Dedicated SMB share’ mode. This folder is managed by Tenable Identity Exposure. Default: C:\Tenable\IdentityExposure\IOALogs. Optional parameter.
    UseXmlEventRender Enables legacy XML-based event rendering for listeners. This method is slower but more stable than the values-based renderer. Disabled by default.
    OutputCertificate Allows the output the Tenable certificate in the current directory (useful when necessary to allowlist it in EDR/AV). This parameter is optional.
    GetSignatureToWhitelist Allows the display the hash of deployed listenerLauncher.ps1 script to allowlist it in the EDR/AV prior to the deployment.
    TimerInMinutes Sets a delay (in minutes) before starting the IoA deployment. Use this timer during installation to pause the process before the deployment begins.

Maintaining IoA Certificate Validity

To ensure your Indicators of Attack (IoA) deployment remains active and secure, you must regularly redeploy the newest version of the IoA script. This process allows Tenable Identity Exposure to install an updated Tenable code-signing certificate before the current one expires.

Group Policy Object

After you download and run the Indicators of Attack (IoA) installation file, the IoA script creates a new Group Policy Object (GPO) named by default Tenable.ad in the Active Directory (AD) database. The system links the Tenable Identity Exposure GPO only to the Domain Controllers' Organizational Unit (OU) that contains all domain controllers (DCs). The new policy automatically replicates between all DCs using the GPO mechanism.

See also